class Aws::STS::Types::AssumeRoleWithSAMLResponse
@see docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumeRoleWithSAMLResponse AWS API Documentation
@return [String]<br>: docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html<br>[1]: docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts#iam-term-role-chaining<br><br><br><br>characters: =,.@-
spaces. You can also include underscores or any of the following
consisting of upper- and lower-case alphanumeric characters with no
The regex used to validate this parameter is a string of characters
*IAM User Guide*.
[Monitor and control actions taken with assumed roles] in the
assertion. For more information about using source identity, see
`AssumeRoleWithSAML`. You do this by adding an attribute to the SAML
like user name or email, as the source identity when calling
identity provider to use an attribute associated with your users,
across [chained role] sessions. You can configure your SAML
request for all actions that are taken by the role and persists
identity is set, the value cannot be changed. It is present in the
taken with the role are associated with that user. After the source
condition key in a role trust policy. That way, actions that are
assume a role. You do this by using the ‘sts:SourceIdentity`
You can require users to set a source identity value when they
The value in the `SourceIdentity` attribute in the SAML assertion.
@!attribute [rw] source_identity
@return [String]
“/MySAMLIdP” ) )`
`BASE64 ( SHA1 ( “example.com/saml” + “123456789012” +
The following pseudocode shows how the hash value is calculated:
uniquely identify a user.
The combination of `NameQualifier` and `Subject` can be used to
in IAM.
* The friendly name (the last part of the ARN) of the SAML provider
* The Amazon Web Services account ID.
* The `Issuer` response value.
A hash value based on the concatenation of the following:
@!attribute [rw] name_qualifier
@return [String]
`SubjectConfirmationData` element of the SAML assertion.
The value of the `Recipient` attribute of the
@!attribute [rw] audience
@return [String]
The value of the `Issuer` element of the SAML assertion.
@!attribute [rw] issuer
@return [String]
the format is returned with no modifications.
is returned as `transient`. If the format includes any other prefix,
For example, `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`
`urn:oasis:names:tc:SAML:2.0:nameid-format`, that prefix is removed.
If the format includes the prefix
format are `transient` or `persistent`.
the `NameID` element of the SAML assertion. Typical examples of the
The format of the name ID, as defined by the `Format` attribute in
@!attribute [rw] subject_type
@return [String]
SAML assertion.
The value of the `NameID` element in the `Subject` element of the
@!attribute [rw] subject
@return [Integer]
means the policies and tags exceeded the allowed space.
request fails if the packed size is greater than 100 percent, which
policies and session tags combined passed in the request. The
A percentage value that indicates the packed size of the session
@!attribute [rw] packed_policy_size
@return [Types::AssumedRoleUser]
operation returns.
The identifiers for the temporary security credentials that the
@!attribute [rw] assumed_role_user
@return [Types::Credentials]
</note>
maximum size.
fixed. We strongly recommend that you make no assumptions about the
<note markdown=“1”> The size of the security token that STS API operations return is not
a secret access key, and a security (or session) token.
The temporary security credentials, which include an access key ID,
@!attribute [rw] credentials
to make Amazon Web Services requests.
including temporary Amazon Web Services credentials that can be used
Contains the response to a successful AssumeRoleWithSAML request,